Wireless Safety

Wireless Safety


Course Description

“Wireless Safety” serves to expose the reader to diverse wireless communication technologies while mapping them to real world applications. It provides an overview of WAP (wireless application protocol) and how developers view these enabling technologies, and gives a peek into future trends. Topics covered in the module include wireless signal propagation, IEEE and ETSI wireless standards, WLANs and operation, wireless protocols and communication languages, wireless devices and wireless security. Wireless safety requires no pre-requisite knowledge and aims to educate in simple applications of these technologies.

Wireless safety breaks the myths of wireless computing and reveals the security aspects of wireless technology and what can be done to secure access, while preparing readers for success on the Wireless|5 certification from EC-Council. For those already in the field, this certification provides the knowledge to excel in the workplace and provides a path for career advancement. For those in the classroom, this book lays a strong foundation to explore technology further.
 

 



 

Courseware - Wireless Safety

 

Who Should Attend

This course will significantly benefit the security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

  • Duration: 2 days (9:00AM – 5:00PM)
  • CPE/ECE Qualification: 2 ECE Credits awarded for attendance (1 for each 8 hour class day)
  • Program Cost: $750 USD
  • Supplement Cost (Courseware & Certificate exam Access): $75 USD
  • Bundle Price: $799 USD
  • Getting Started: Find Training Click HERE
  • Corporate Trainers interested in setting up internal company training programs, click here

 

 

What’s included?

  • Physical Courseware
  • 1 year Access To EC-Council Student LMS for Practical Labs (if applicable), testing, and Certificate

 


Course Briefing

Introduction to Wireless Networks

Wireless network is a form of telecommunication in which the electromagnetic waves carry a signal to transfer data over a distance without the use of electrical conductors or wires. This module discusses in detail about the wireless networks, history of wireless communications, types of wireless network, various advantages and disadvantages of wireless communications, and limitations of wireless communications. The module discusses various generations and uses of wireless technology.


 

 















Wireless Signal Propagation

Wireless is a generic word used to describe communications in which electromagnetic waves or RF waves carry a signal over a part of or the entire communication path. This module discusses in detail about the various concepts involved in wireless signal propagation, components of radio system, transmission directions, different types of signal switching, and analog and digital modulations.


 













Wireless-Communication-Standards-text

Many institutes offer wireless communication standards for high-speed wireless local area networking. IEEE standards encompass a range of industries; they address high-impact technologies, for the existing infrastructures to our society or disincline. This module discusses the various institutions that offer wireless communication standards. It also discusses various IEEE and ETSI standards.

 














WLAN and Operations

WLAN (wireless local area network) connects computers over a local network that exchanges data and other information without the use of cables. This module discusses the basic components of WLAN, different types of WLAN, and advantages of using a WLAN. It also discusses the WLAN management, configuration process of WLAN, and troubleshooting of WLAN.

 














Wireless Technologies

Wireless technology has revolutionized almost all areas of our day-to-day lives. Whether in a university, office, home, or shopping mall, wireless technology is a flexible and cost-effective solution for technology needs. This technology is used to connect computers, permit remote monitoring and data achievement, and to provide access control and security. This module familiarizes with wireless technologies and types of wireless technologies that can be used to create a wireless network. It also discusses the fixed wireless broadband technologies, types of fixed wireless broadband technologies, and advantages of the fixed wireless broadband technologies.

 
















Wireless Protocols and Communication Languages

Wireless protocols are the set of rules that govern the exchange of information between the wireless devices. This module discusses the various wireless protocols used for wireless communication and programming languages used in the wireless devices.

 















Wireless Devices

A typical wireless infrastructure comprises devices that connect to the network. These devices are used to make up a typical wireless infrastructure. This module discusses the various wireless devices that make up a typical wireless infrastructure. It also explains how to add wireless network to a wired network.

 















Fundamentals of RFID

RFID (Radio-Frequency Identification) is an automatic identification technique that stores and retrieves data using devices known as RFID tags, or transponders. It transmits the identity of an object in the form of a unique serial number with the help of radio waves. RFID wireless transmission of data takes place between the data-carrying devices and its reader. This module discusses in detail about the fundamentals of RFID, components of RFID system, RFID system architecture, and applications of RFID system. It also discusses RFID standards used for automatic identification and item management.

 















Wireless VoIP

Voice over Internet Protocol (VoIP) technology is used to route voice over the Internet or through any other Internet protocol–based network. It allows users to make voice calls using an Internet connection. With a VoIP system, users can make a call from a computer, special VoIP phone, or traditional phone with an adapter to another computer or phone. This module familiarizes with Voice over Internet Protocol (VoIP), types of VoIP technologies, mobile VoIP, wireless VoIP, and wireless VoIP standards and protocols. This module also explains the need of software support for VoIP, challenges for building successful wireless VoIP products, and different attacks on wireless VoIP.

 















Wireless Security

Wired and wireless network communications each have pros and cons; wired networks offer more and better security options than the wireless networks. A wireless network provides users the freedom to move from place to place within the network with uninterrupted connectivity. This module familiarizes with wireless security, types of wireless attacks, WEP (Wired Equivalent Privacy), and SSID (Service Set Identifier). It also discusses the various steps for hacking wireless networks. It also explains how to secure the wireless network from the various attacks.














Course Outline

Introduction to Wireless Networks

  • Introduction to Wireless Networks
  • Wired Versus Wireless Networks
  • Types of Wireless Networks: Based on Connection
  • Types of Wireless Networks: Based on Geographical Area Covered
  • Generations of Wireless Technology
  • Uses of Wireless Technology

 

 















Wireless Signal Propagation

  • Introduction to Wireless Signal Propagation
  • Analog and Digital Signals
  • Radio Waves
  • Infrared Light
  • Transmission Speed
  • Components of a Radio System
  • Transmission Direction
  • Switching
  • Signal Strength
  • Ultra WideBand (UWB)
  • Modulation
  • Spread Spectrum

 













Wireless-Communication-Standards-text

  • Introduction to Institutes Offering Wireless Communication Standards
  • IEEE
  • IEEE Standards
  • 802.1x
  • 802.11 (Wi-Fi Standard)
  • ETSI Standards













WLAN and Operations

  • Introduction to WLAN and Operations
  • Types of WLAN
  • Roaming
  • Campus Topologies
  • Virtual LAN (VLAN)
  • Distributed Coordination Function (DCF)
  • Transmission Opportunity (TXOP)
  • Proxy Mobile IP (PMIP)
  • WLAN Management
  • Setting Up a WLAN
  • WLAN Security: Passphrase
  • Troubleshooting a WLAN

 














Wireless Technologies

  • Introduction to Wireless Technologies
  • IrDA
  • Bluetooth
  • Wibree
  • Wi-Fi
  • GSM
  • GPRS
  • EDGE
  • FDMA
  • TDMA
  • CDMA
  • ZigBee
  • ZigBee Stack Architecture
  • ZigBee Devices
  • Fixed Wireless Broadband Technologies
  • IDEN
  • CDPD
  • HSCSD
  • PDC-P
  • FRS
  • GMRS
  • BSS
  • HPNA and Powerline Ethernet

 
















Wireless Protocols and Communication Languages

  • Introduction to Wireless Protocols and Communication Languages
  • Wireless Protocols
  • Programming Languages Used for Wireless Communication

 















Wireless Devices

  • Introduction to Wireless Devices
  • Antennas
  • Access Points (AP)
  • PC Cards
  • Wireless Cards
  • Wireless Modem
  • Wireless Router
  • Wireless USB
  • Wireless Game Adapter
  • Wireless Print Server
  • Wireless Range Extender
  • Wireless Internet Video Camera
  • Bluetooth Connectivity Devices
  • Wireless Media Gateway: WMG80
  • Wireless Presentation Gateway: D-Link DPG-2000W
  • Hotspot Gateway
  • GSM Network Devices
  • Add Wireless to a Wired Network

 















Fundamentals of RFID

  • Introduction to Fundamentals of RFID
  • RFID (Radio-Frequency Identification)
  • RFID System Components
  • RFID System Architecture
  • RFID Frequencies
  • Applications of RFID Systems
  • RFID Standards
  • RFID Collisions
  • RFID Security and Privacy Threats
  • RFID Malware
  • RFID Security
  • RFID and Privacy Issues
  • RFID Vendors

 















Wireless VoIP

  • Introduction to Wireless VoIP
  • VoIP Technology
  • Software Support for VoIP
  • Mobile VoIP
  • VoIP over BreezeACCESS VL
  • Voice over WLAN (VoWLAN
  • Wireless VoIP
  • Standards and Protocols
  • Real-Time Transport Protocol (RTP)/RTP Control Protocol (RTCP)
  • MediaPro: VoIP and Video Analyzer
  • 323Sim: H.323 Simulator
  • Unlicensed Mobile Access (UMA)
  • Wireless VoIP Gateway
  • Wireless IP Phone
  • Challenges to Building Successful Wireless VoIP Products
  • Attacks on Wireless VoIP
  • VoIP Vendors

 















Wireless Security

  • Introduction to Wireless Security
  • Business and Wireless Attacks
  • Types of Wireless Attacks
  • WEP (Wired Equivalent Privacy)
  • SSID (Service Set Identifier)
  • Beacon Frames
  • MAC (Media Access Control) Address
  • Rogue Access Points
  • Stream Cipher
  • Steps for Hacking Wireless Networks
  • WPA
  • WTLS
  • Mobile Security Through Certificates
  • Certificate Management Through Public Key Infrastructure
  • WifiScanner
  • BTScanner
  • Wireless Network Security Checklist
  • Securing the Wireless Network